Cybersecurity and cyberwar : what everyone needs to know
Bookreader Item Preview
Share or Embed This Item
texts
Cybersecurity and cyberwar : what everyone needs to know
- Publication date
- 2014
- Topics
- Computer security -- United States, Computer networks -- Security measures -- United States, Cyberspace -- Security measures -- United States, Cyberterrorism -- United States -- Prevention, Cyberspace operations (Military science), Information warfare -- United States -- Prevention, POLITICAL SCIENCE -- Political Freedom & Security -- International Security, Computer networks -- Security measures, Computer security, Cyberterrorism -- Prevention, Information warfare -- Prevention, Beveiliging, Internet, United States of America, Cyberspace, National security, Computer-related crime, Cyberwarfare, Information and communication technology, IT-säkerhet, Datanät -- säkerhetsaspekter, Cyberspace -- säkerhetsaspekter, Cyberterrorism -- prevention, Informationskrigföring, IW -- computers -- information technology -- communications -- security -- terrorism -- USA, Förenta staterna, United States
- Publisher
- Oxford : Oxford University Press
- Collection
- internetarchivebooks; printdisabled
- Contributor
- Internet Archive
- Language
- English
- Item Size
- 718.9M
viii, 306 pages : 22 cm
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into U.S. government computer systems by Chinese hackers -- presumably sponsored by the Chinese government -- is another. Together, they point to a new era in the evolution of human conflict. Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They explain what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves
Includes bibliographical references (pages 259-291) and index
Introduction -- pt. I. How it all works -- Defining cyberspace -- "Cyber stuff" : a short history of the internet -- Understanding internet governance -- On the internet : identity and authentication -- Security -- What are the threats? -- Phish : vulnerabilities -- WikiLeaks -- What is advanced persistent threat (APT)? -- The basics of computer defense -- Who is the weakest link? : human factors -- pt. II. Why it matters -- What is the meaning of cyberattack? : importance of terms and frameworks -- The problem of attribution -- What is hactivism? -- Who is anonymous? -- What is cybercrime? -- Shady RATs and cyberspies : what is cyber espionage? -- Cyberterrorism -- How do terrorist actually use the web? -- Cyber Counterterrorism -- Security risk or human right? : foreign policy and the internet -- What is Tor and why does peeling back the onion matter? -- Patriotic hackers -- What was Stuxnet? -- The ethics of cyberweapons -- Defining cyberwar -- The legal side of cyber conflict -- What might a "cyberwar" actually look like? : computer network operations -- What is the US Military approach to cyberwar? -- What is the Chinese approach to cyberwar? -- Deterrence in an era of cyberwar -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- What are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Is t here a cyber-industrial complex? -- pt. III. What can we do? -- Why we can't just build a new, more secure internet -- Rethink security : what is resilience -- Re frame the problem : what can we learn from public health? -- What can pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web : what is the role of international institutions? -- "Graft" the rule of law : do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace -- Rethink government's role : how can we better organize for cybersecurity? -- Approach it as public-private problem : how do we better coordinate defense? -- How can we better prepare for cyber incidents? -- Cybersecurity incentives -- How can we better collaborate on information? -- Demand disclosure : what is the role of transparency? -- Accountability for security -- How do we solve the cyber people problem? -- How can I protect myself and the internet? -- Conclusions -- Where is cybersecurity headed next? -- What do I really need to know in the end?
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into U.S. government computer systems by Chinese hackers -- presumably sponsored by the Chinese government -- is another. Together, they point to a new era in the evolution of human conflict. Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They explain what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves
Includes bibliographical references (pages 259-291) and index
Introduction -- pt. I. How it all works -- Defining cyberspace -- "Cyber stuff" : a short history of the internet -- Understanding internet governance -- On the internet : identity and authentication -- Security -- What are the threats? -- Phish : vulnerabilities -- WikiLeaks -- What is advanced persistent threat (APT)? -- The basics of computer defense -- Who is the weakest link? : human factors -- pt. II. Why it matters -- What is the meaning of cyberattack? : importance of terms and frameworks -- The problem of attribution -- What is hactivism? -- Who is anonymous? -- What is cybercrime? -- Shady RATs and cyberspies : what is cyber espionage? -- Cyberterrorism -- How do terrorist actually use the web? -- Cyber Counterterrorism -- Security risk or human right? : foreign policy and the internet -- What is Tor and why does peeling back the onion matter? -- Patriotic hackers -- What was Stuxnet? -- The ethics of cyberweapons -- Defining cyberwar -- The legal side of cyber conflict -- What might a "cyberwar" actually look like? : computer network operations -- What is the US Military approach to cyberwar? -- What is the Chinese approach to cyberwar? -- Deterrence in an era of cyberwar -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- What are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Is t here a cyber-industrial complex? -- pt. III. What can we do? -- Why we can't just build a new, more secure internet -- Rethink security : what is resilience -- Re frame the problem : what can we learn from public health? -- What can pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web : what is the role of international institutions? -- "Graft" the rule of law : do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace -- Rethink government's role : how can we better organize for cybersecurity? -- Approach it as public-private problem : how do we better coordinate defense? -- How can we better prepare for cyber incidents? -- Cybersecurity incentives -- How can we better collaborate on information? -- Demand disclosure : what is the role of transparency? -- Accountability for security -- How do we solve the cyber people problem? -- How can I protect myself and the internet? -- Conclusions -- Where is cybersecurity headed next? -- What do I really need to know in the end?
Notes
Obscured text on back cover due to sticker attached.
- Access-restricted-item
- true
- Addeddate
- 2021-06-18 04:04:58
- Associated-names
- Friedman, Allan, author
- Boxid
- IA40137507
- Camera
- USB PTP Class Camera
- Collection_set
- printdisabled
- External-identifier
-
urn:oclc:record:1259487985
urn:lcp:cybersecuritycyb0000sing:lcpdf:e73213d8-6076-4959-ad36-5bd4c957f8ed
urn:lcp:cybersecuritycyb0000sing:epub:3a226d15-df37-45fe-a906-936f34003a90
- Foldoutcount
- 0
- Grant_report
- Arcadia #4281
- Identifier
- cybersecuritycyb0000sing
- Identifier-ark
- ark:/13960/t3zt4cm8k
- Invoice
- 2089
- Isbn
-
9780199918096
0199918090
9780199918119
0199918112
- Lccn
- 2013028127
- Ocr
- tesseract 5.0.0-alpha-20201231-10-g1236
- Ocr_detected_lang
- en
- Ocr_detected_lang_conf
- 1.0000
- Ocr_detected_script
- Latin
- Ocr_detected_script_conf
- 0.9735
- Ocr_module_version
- 0.0.13
- Ocr_parameters
- -l eng
- Old_pallet
- IA-WL-1200040
- Openlibrary_edition
- OL26154301M
- Openlibrary_work
- OL17563738W
- Page_number_confidence
- 100
- Page_number_module_version
- 1.0.5
- Pages
- 326
- Pdf_module_version
- 0.0.14
- Ppi
- 360
- Rcs_key
- 24143
- Republisher_date
- 20210618082301
- Republisher_operator
- associate-jeracel-hilo@archive.org
- Republisher_time
- 762
- Scandate
- 20210616062106
- Scanner
- station32.cebu.archive.org
- Scanningcenter
- cebu
- Scribe3_search_catalog
- isbn
- Scribe3_search_id
- 9780199918119
- Source
- removed
- Tts_version
- 4.5-initial-63-g7e8faad7
- Full catalog record
- MARCXML
comment
Reviews
There are no reviews yet. Be the first one to
write a review.
1,566 Views
36 Favorites
Purchase options
DOWNLOAD OPTIONS
No suitable files to display here.
IN COLLECTIONS
Internet Archive BooksUploaded by station32.cebu on